Guarded dual authentication based DRM with resurgence dynamic encryption techniques

Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algo...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Enterprise information systems Ročník 13; číslo 3; s. 257 - 280
Hlavní autori: Agarwal, Neha, Rana, Ajay, Pandey, J.P.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Taylor & Francis 16.03.2019
Predmet:
ISSN:1751-7575, 1751-7583
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving.
AbstractList Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent. Some cryptographic techniques have been used for protection in form of identity, attributes and prediction algorithms nonetheless these algorithms lack their performance and becomes are very prone to attackers when an unauthorized user reunited the system with dissimilar way for privileges to the similar data files. The essential need of this data security solved by some enhanced cryptographic techniques in DRM utilizing a secure privacy preserving data sharing with encryption techniques of Dynamic Unidirectional Proxy Re-Encryption. This technique is based on Cipher text Policy Attribute by providing the privacy, integrity and security of the data while retrieving.
Author Agarwal, Neha
Pandey, J.P.
Rana, Ajay
Author_xml – sequence: 1
  givenname: Neha
  surname: Agarwal
  fullname: Agarwal, Neha
  email: agarwalnehajain@gmail.com
  organization: Department of Computer Science Engineering, Amity University
– sequence: 2
  givenname: Ajay
  surname: Rana
  fullname: Rana, Ajay
  organization: Department of Computer Science Engineering, Amity University
– sequence: 3
  givenname: J.P.
  surname: Pandey
  fullname: Pandey, J.P.
  organization: Department of Electrical Engineering, KNIT
BookMark eNp9kNtKw0AQhhepYFt9BCEvkLq7yR56p1StQkXwcL3sYWJX0k3dTSh5e1NbvRQGZv6Z-f-Lb4JGoQmA0CXBM4IlviKCDSXYjGIiZ4RRgUtygsb7fS6YLEZ_s2BnaJLSJ8ZcYsHG6HXZ6ejAZa7Tdaa7dg2h9Va3vgmZ0Wm43L48ZTvfrrMIqYsfECxkrg964202iNhvf55bsOvgvzpI5-i00nWCi2Ofovf7u7fFQ756Xj4ubla5pUy2OTdcutLMiS6cJtYwwGAKI2Fubcm5MabkugLBOKECKk556cq5xYRQoI7qYorYIdfGJqUIldpGv9GxVwSrPRn1S0btyagjmcF3ffD5UDVxo3dNrJ1qdV83sYo6WJ9U8X_ENypWbj0
Cites_doi 10.1016/j.jnca.2013.05.006
10.1109/TMC.2017.2693990
10.1080/17517575.2011.654266
10.1016/j.future.2015.11.012
10.14569/issn.2156-5570
10.1016/j.is.2013.08.004
10.1007/978-3-642-14478-3_40
10.1109/TMC.2014.2362760
10.1016/j.jnca.2012.07.007
10.1109/TII.2011.2167156
10.1007/978-3-319-46608-8_2
10.1109/APNOMS.2015.7275375
10.1109/JSYST.2014.2379646
10.1002/sec.v7.11
10.1007/s12204-014-1514-6
10.1016/j.jnca.2016.09.002
10.1007/s11276-014-0788-9
10.1016/j.eswa.2014.06.027
10.17485/ijst/2015/v8i12/52923
10.1016/j.pmcj.2015.06.016
10.1016/j.ins.2016.09.005
10.1109/TIFS.2012.2223683
10.1109/TC.2013.200
10.1016/j.jss.2014.11.050
10.1109/TCC.2015.2398426
10.1016/j.is.2014.05.004
10.1109/TKDE.2016.2580139
ContentType Journal Article
Copyright 2018 Informa UK Limited, trading as Taylor & Francis Group 2018
Copyright_xml – notice: 2018 Informa UK Limited, trading as Taylor & Francis Group 2018
DBID AAYXX
CITATION
DOI 10.1080/17517575.2018.1527041
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-7583
EndPage 280
ExternalDocumentID 10_1080_17517575_2018_1527041
1527041
Genre Article
GroupedDBID .7F
0BK
0R~
30N
4.4
8VB
AAGDL
AAHIA
AAJMT
AALDU
AAMIU
AAPUL
AAQRR
ABCCY
ABFIM
ABJNI
ABLIJ
ABPAQ
ABPEM
ABTAI
ABXUL
ABXYU
ACGFS
ACTIO
ADCVX
ADGTB
ADMLS
AEISY
AENEX
AEYOC
AFRVT
AGDLA
AHDZW
AHQJS
AIJEM
AIYEW
AKBVH
AKOOK
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AQRUH
AQTUD
AVBZW
AWYRJ
BLEHA
CCCUG
CE4
CS3
DGEBU
DKSSO
DU5
EBS
EBU
EJD
E~A
E~B
GTTXZ
H13
HZ~
H~P
IPNFZ
J~4
K1G
KYCEM
LJTGL
M4Z
MK~
O9-
P2P
QWB
RIG
RNANH
ROSJB
RTWRZ
S-T
SNACF
TASJS
TBQAZ
TDBHL
TEN
TFL
TFT
TFW
TH9
TTHFI
TUROJ
TWF
TWQ
UT5
UU3
ZGOLN
ZL0
AAYXX
CITATION
ID FETCH-LOGICAL-c258t-6b68d4b91a3da1cb5e0eb3b8e9cc466bbb46afe756127ef6264d49c0112e2d2a3
IEDL.DBID TFW
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000458239600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1751-7575
IngestDate Sat Nov 29 06:46:09 EST 2025
Mon Oct 20 23:49:45 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c258t-6b68d4b91a3da1cb5e0eb3b8e9cc466bbb46afe756127ef6264d49c0112e2d2a3
PageCount 24
ParticipantIDs informaworld_taylorfrancis_310_1080_17517575_2018_1527041
crossref_primary_10_1080_17517575_2018_1527041
PublicationCentury 2000
PublicationDate 3/16/2019
2019-03-16
PublicationDateYYYYMMDD 2019-03-16
PublicationDate_xml – month: 03
  year: 2019
  text: 3/16/2019
  day: 16
PublicationDecade 2010
PublicationTitle Enterprise information systems
PublicationYear 2019
Publisher Taylor & Francis
Publisher_xml – name: Taylor & Francis
References CIT0030
CIT0010
CIT0031
CIT0012
CIT0011
Patil K. (CIT0018); 4
CIT0014
CIT0013
CIT0016
CIT0015
CIT0017
Spandana B. (CIT0025) 2016; 08
CIT0020
CIT0001
CIT0023
CIT0022
Rafeeq M. D. (CIT0019) 2015; 3
CIT0003
Sandhu G. K. (CIT0021) 2016; 6
CIT0002
CIT0024
CIT0005
CIT0027
CIT0004
CIT0026
CIT0007
CIT0029
CIT0006
CIT0028
CIT0009
CIT0008
References_xml – ident: CIT0005
  doi: 10.1016/j.jnca.2013.05.006
– ident: CIT0006
  doi: 10.1109/TMC.2017.2693990
– volume: 4
  start-page: 1101
  ident: CIT0018
  publication-title: International Research Journal of Engineering and Technology (IRJET)
– ident: CIT0013
  doi: 10.1080/17517575.2011.654266
– volume: 6
  start-page: 2
  year: 2016
  ident: CIT0021
  publication-title: Global Journal of Computer Science and Technology
– ident: CIT0016
  doi: 10.1016/j.future.2015.11.012
– ident: CIT0001
  doi: 10.14569/issn.2156-5570
– ident: CIT0020
  doi: 10.1016/j.is.2013.08.004
– ident: CIT0003
  doi: 10.1007/978-3-642-14478-3_40
– volume: 3
  start-page: 1086
  issue: 3
  year: 2015
  ident: CIT0019
  publication-title: International Journal of Computer Science and Engineering
– ident: CIT0017
  doi: 10.1109/TMC.2014.2362760
– ident: CIT0024
  doi: 10.1016/j.jnca.2012.07.007
– ident: CIT0008
  doi: 10.1109/TII.2011.2167156
– ident: CIT0026
  doi: 10.1007/978-3-319-46608-8_2
– ident: CIT0027
  doi: 10.1109/APNOMS.2015.7275375
– ident: CIT0002
  doi: 10.1109/JSYST.2014.2379646
– ident: CIT0011
  doi: 10.1002/sec.v7.11
– ident: CIT0029
  doi: 10.1007/s12204-014-1514-6
– ident: CIT0023
  doi: 10.1016/j.jnca.2016.09.002
– ident: CIT0007
  doi: 10.1007/s11276-014-0788-9
– ident: CIT0030
  doi: 10.1016/j.eswa.2014.06.027
– ident: CIT0028
  doi: 10.17485/ijst/2015/v8i12/52923
– ident: CIT0022
  doi: 10.1016/j.pmcj.2015.06.016
– volume: 08
  start-page: 3600
  year: 2016
  ident: CIT0025
  publication-title: International Journal of Advanced Technology and Innovative Research
– ident: CIT0014
  doi: 10.1016/j.ins.2016.09.005
– ident: CIT0015
  doi: 10.1109/TIFS.2012.2223683
– ident: CIT0031
  doi: 10.1109/TC.2013.200
– ident: CIT0004
  doi: 10.1016/j.jss.2014.11.050
– ident: CIT0012
  doi: 10.1109/TCC.2015.2398426
– ident: CIT0009
  doi: 10.1016/j.is.2014.05.004
– ident: CIT0010
  doi: 10.1109/TKDE.2016.2580139
SSID ssj0068075
Score 2.1926336
Snippet Cloud computing is the emergent technology that face one of the significant issues time with data security while outsourcing the data onto the cloud in recent....
SourceID crossref
informaworld
SourceType Index Database
Publisher
StartPage 257
SubjectTerms Covariance matrix Adaptation Evolution Strategies (CMA-ES)
Efficient Elliptic Curve Public Key Encryption (EECPKE)
integrity checking protocol
Twofold authentication protocol
Title Guarded dual authentication based DRM with resurgence dynamic encryption techniques
URI https://www.tandfonline.com/doi/abs/10.1080/17517575.2018.1527041
Volume 13
WOSCitedRecordID wos000458239600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAWR
  databaseName: Taylor & Francis Journals Complete
  customDbUrl:
  eissn: 1751-7583
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0068075
  issn: 1751-7575
  databaseCode: TFW
  dateStart: 20070201
  isFulltext: true
  titleUrlDefault: https://www.tandfonline.com
  providerName: Taylor & Francis
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6yeNCDb3F9kYPXah9p0hxFXTzoIrri3kpeBS9Vtl3Bf-9MmsruQS8KpZDDlDKZzDcTZr4h5MyA3SiVVZECLIqYtSzSCbxEZiUYWGYT7RuF78R4XEyn8iFUEzahrBJz6KojivC-Gg-30k1fEXcBiAePyLEwq8ABPiL2resA_Xg0J6OX3hfzQLWLEhGK9D08P31lCZ2WuEsXUGe0-Q__u0U2QshJLzsb2SYrrt4h6wtEhLvkyVuKsxQ7s6jCqve6Dbd5FIHO0uvHe4qXthTy87nv2HTUduPsKSxmn9730G9O2GaPPI9uJle3URi3EJk0L9qIa15YpmWiMqsSo3MXQ6atCyeNYZxrrRlXlRM4T1O4CjIhZpk04CBSl9pUZftkUL_V7oBQHoNEnKo01YYJYQsHcQCTGYRLyAiWDMl5r-byvWPVKJNAVtprq0RtlUFbQyIXN6Ns_XVG1c0eKbNfZQ__IHtE1mApsegs4cdk0M7m7oSsmo_2tZmdelv7Av5V0Kw
linkProvider Taylor & Francis
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6kCurBt1ife_AazWOzmz2KWiq2PWjF3sK-Ar1EaVPBf-9MHpIe9KIQAiFMCJPJfDPDzDeEXBqwG6WizFOARR6zlnk6gJOIrAQDi2ygy0HhgRiNkslEtmdhsK0Sc-isIooofTX-3FiMblrirgHy4BAxdmYluMFH-Di7vhoD1iJ__rj32nhjXpPtooiHMs0Uz0-PWcKnJfbSFu70tv_jjXfIVh110pvKTHbJisv3yGaLi3CfPJfG4izF4SyqsPE9L-qCHkWss_TuaUixbkshRV-UQ5uO2mqjPYWL2Wfpfug3Lez8gLz07se3fa_euOCZME4Kj2ueWKZloCKrAqNj50OyrRMnjWGca60ZV5kTuFJTuAySIWaZNOAjQhfaUEWHpJO_5e6IUO6DhB-qMNSGCWETB6EAkxFETEgKFnTJVaPn9L0i1kiDmq-00VaK2kprbXWJbH-NtCgrGlm1fiSNfpU9_oPsBVnvj4eDdPAwejwhG3BLYg9awE9Jp5gt3BlZMx_FdD47Lw3vC0xl1NY
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF5ERfTgW6zPPXiN5rHdzR7FGhRrKVqxt7CvgJda2lTw3zuTbKQ96EUhBEKYECZf5sXMN4RcGMCNUkkRKPBFAbOWBTqCk0isBIAlNtLVoHBX9HrpcCj7vptw6tsqMYcuaqKIylbjzz22RdMRdwUeDw7RxsasFBf4iBBH11cgdOYI8kH22hhj7rl2USRAmWaI56fHLLinBfLSObeTbf3DC2-TTR9z0usaJDtkyY12ycYcE-Eeea6g4izF0SyqsO19VPpyHkVPZ2nn6ZFi1ZZCgj6rRjYdtfU-ewoXk8_K-NBvUtjpPnnJbgc3d4HftxCYuJ2WAdc8tUzLSCVWRUa3XQiptk6dNIZxrrVmXBVO4EJN4QpIhZhl0oCFiF1sY5UckOXR-8gdEspDkAhjFcfaMCFs6iAQYDKBeAkpwaIWuWzUnI9rWo088myljbZy1FbutdUicv5j5GVVzyjq5SN58qvs0R9kz8lav5Pl3fvewzFZhzsSG9AifkKWy8nMnZJV81G-TSdnFey-AOi004g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Guarded+dual+authentication+based+DRM+with+resurgence+dynamic+encryption+techniques&rft.jtitle=Enterprise+information+systems&rft.au=Agarwal%2C+Neha&rft.au=Rana%2C+Ajay&rft.au=Pandey%2C+J.P.&rft.date=2019-03-16&rft.issn=1751-7575&rft.eissn=1751-7583&rft.volume=13&rft.issue=3&rft.spage=257&rft.epage=280&rft_id=info:doi/10.1080%2F17517575.2018.1527041&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_17517575_2018_1527041
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-7575&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-7575&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-7575&client=summon